Posted:3 weeks ago| Platform:
Work from Office
Required Skills Behavioral | Aptitude | Communication Technology | Cybersecurity | SOC Alert Management Technology | Cybersecurity | Vulnerability Management Technology | Cybersecurity | SOC Monitoring Technology | Cybersecurity | Cloud Security Education Qualification : Any Graduate Certification Mandatory / Desirable : Technology | IT Security Certifications | EC-Council Certifications | EC-Council Certified Ethical Hacker (CEH) Details: Need to both keep an eye out for attacks in progress and try to figure out ways to beef up defenses to prevent or mitigate future attacks. To that end, you need to install security tools, investigate the suspicious activities those tools detect, support audit and compliance initiatives, and participate in developing security strategies 1. Escalate validated and confirmed incidents to designated incident response team. 2. Notify Client of incident and required mitigation works. 3. Fine-tune SIEM rules to reduce false positive and remove false negatives. 4. Collect global threat intelligence and internal threats then inject actions based on analysis and recommendation. 5. Proactively research and monitor security information to identify potential threats that may impact the organisation. 6. Develop and distribute information and alerts on required corrective actions to the organisation. 7. Learn new attack patterns, actively participate in security forums. 8. Work closely with Vulnerability Management and designated incident response team. 9. Understand the structure and the meaning of logs from different log sources. 10. Perform threat intel research. 11. Ability to run and understand Sandbox Static Analysis. 12. Analyst should know how to include details related to the logs, alarms and other indicators identified in accordance with the intervention protocol of each client and the SLA.
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.